Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:38692 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 5178 invoked from network); 1 Jul 2008 22:18:07 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 1 Jul 2008 22:18:07 -0000 Authentication-Results: pb1.pair.com smtp.mail=wietse@porcupine.org; spf=permerror; sender-id=unknown Authentication-Results: pb1.pair.com header.from=wietse@porcupine.org; sender-id=unknown Received-SPF: error (pb1.pair.com: domain porcupine.org from 168.100.189.2 cause and error) X-PHP-List-Original-Sender: wietse@porcupine.org X-Host-Fingerprint: 168.100.189.2 spike.porcupine.org FreeBSD 2.0-4.2 Received: from [168.100.189.2] ([168.100.189.2:4010] helo=spike.porcupine.org) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id E1/3B-06277-E1DAA684 for ; Tue, 01 Jul 2008 18:18:06 -0400 Received: by spike.porcupine.org (Postfix, from userid 1001) id A17FB1F3EA1; Tue, 1 Jul 2008 18:18:03 -0400 (EDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=porcupine.org; s=dktest; t=1214950683; bh=KlJ/tQOqi1lQdXLuWCV2fg1ZUEaQiZ1emOR5lrsY hl4=; h=To:Subject:Message-Id:Date:From; b=tBlQgv2DxwVcjFN6lKCmPqrq 7IvQ0v21CpMSU8dN7d+h6pJqaBx7AQUnDLTLYbCl+KqJn6oBH7IzVtMCNLw47H4+vm8 JmJKhelJfCS59OJwIZf6U04/wgAS5oRwu8iZV7Bc87YPlhQ/0iOzR1UKcpsuYCG20Xg qC9oxgq2SSZ8I= To: internals@lists.php.net Message-ID: <20080701221803.A17FB1F3EA1@spike.porcupine.org> Date: Tue, 1 Jul 2008 18:17:58 -0400 (EDT) Subject: PHP+taint, Windows binaries From: wietse@porcupine.org ((Wietse Venema)) This is an update on my preliminary implementation of support for tainted variables in PHP. To get more feedback from developers with Windows systems, I have built Win32 binaries. These are available in ZIP and Windows installer format from http://wiki.php.net/rfc/taint/ and are compatible with the binaries from http://www.apache.org/ As a reminder, the goal of this project is to help PHP application programmers find and eliminate opportunities for HTML code injection (i.e. XSS), SQL or shell code injection, or PHP control hijacking, before other people can exploit them. With 1% run-time overhead, taint support may also be used as a safety net in production. The preliminary implementation provides taint support for basic operators, for a selection of built-functions and extensions (pcre, mysql, mysqli), and for the Apache server APIs. For source, binaries and more please see http://wiki.php.net/rfc/taint/ Wietse